Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (30)

Search Parameters:
Keywords = Zigbee keys

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
67 pages, 5859 KB  
Review
A Comprehensive Review of Sensing, Control, and Networking in Agricultural Robots: From Perception to Coordination
by Chijioke Leonard Nkwocha, Adeayo Adewumi, Samuel Oluwadare Folorunsho, Chrisantus Eze, Pius Jjagwe, James Kemeshi and Ning Wang
Robotics 2025, 14(11), 159; https://doi.org/10.3390/robotics14110159 - 29 Oct 2025
Cited by 9 | Viewed by 5283
Abstract
This review critically examines advancements in sensing, control, and networking technologies for agricultural robots (AgRobots) and their impact on modern farming. AgRobots—including Unmanned Aerial Vehicles (UAVs), Unmanned Ground Vehicles (UGVs), Unmanned Surface Vehicles (USVs), and robotic arms—are increasingly adopted to address labour shortages, [...] Read more.
This review critically examines advancements in sensing, control, and networking technologies for agricultural robots (AgRobots) and their impact on modern farming. AgRobots—including Unmanned Aerial Vehicles (UAVs), Unmanned Ground Vehicles (UGVs), Unmanned Surface Vehicles (USVs), and robotic arms—are increasingly adopted to address labour shortages, sustainability challenges, and rising food demand. This paper reviews sensing technologies such as cameras, LiDAR, and multispectral sensors for navigation, object detection, and environmental perception. Control approaches, from classical PID (Proportional-Integral-Derivative) to advanced nonlinear and learning-based methods, are analysed to ensure precision, adaptability, and stability in dynamic agricultural settings. Networking solutions, including ZigBee, LoRaWAN, 5G, and emerging 6G, are evaluated for enabling real-time communication, multi-robot coordination, and data management. Swarm robotics and hybrid decentralized architectures are highlighted for efficient collective operations. This review is based on the literature published between 2015 and 2025 to identify key trends, challenges, and future directions in AgRobots. While AgRobots promise enhanced productivity, reduced environmental impact, and sustainable practices, barriers such as high costs, complex field conditions, and regulatory limitations remain. This review is expected to provide a foundation for guiding research and development toward innovative, integrated solutions for global food security and sustainable agriculture. Full article
(This article belongs to the Special Issue Smart Agriculture with AI and Robotics)
Show Figures

Graphical abstract

17 pages, 665 KB  
Article
Optimization of Delay Time in ZigBee Sensor Networks for Smart Home Systems Using a Smart-Adaptive Communication Distribution Algorithm
by Igor Medenica, Miloš Jovanović, Jelena Vasiljević, Nikola Radulović and Dragan Lazić
Electronics 2025, 14(15), 3127; https://doi.org/10.3390/electronics14153127 - 6 Aug 2025
Viewed by 2061
Abstract
As smart homes and Internet of Things (IoT) ecosystems continue to expand, the need for energy-efficient and low-latency communication has become increasingly critical. One of the key challenges in these systems is minimizing delay time while ensuring reliable and efficient communication between devices. [...] Read more.
As smart homes and Internet of Things (IoT) ecosystems continue to expand, the need for energy-efficient and low-latency communication has become increasingly critical. One of the key challenges in these systems is minimizing delay time while ensuring reliable and efficient communication between devices. This study focuses on optimizing delay time in ZigBee sensor networks used in smart-home systems. A Smart–Adaptive Communication Distribution Algorithm is proposed, which dynamically adjusts the communication between network nodes based on real-time network conditions. Experimental measurements were conducted under various scenarios to evaluate the performance of the proposed algorithm, with a particular focus on reducing delay and enhancing overall network efficiency. The results demonstrate that the proposed algorithm significantly reduces delay times compared to traditional methods, making it a promising solution for delay-sensitive IoT applications. Furthermore, the findings highlight the importance of adaptive communication strategies in improving the performance of ZigBee-based sensor networks. Full article
(This article belongs to the Special Issue Energy-Efficient Wireless Sensor Networks for IoT Applications)
Show Figures

Figure 1

19 pages, 13424 KB  
Article
A Comprehensive Analysis of Security Challenges in ZigBee 3.0 Networks
by Akbar Ghobakhlou, Duaa Zuhair Al-Hamid, Sara Zandi and James Cato
Sensors 2025, 25(15), 4606; https://doi.org/10.3390/s25154606 - 25 Jul 2025
Cited by 4 | Viewed by 6343
Abstract
ZigBee, a wireless technology standard for the Internet of Things (IoT) devices based on IEEE 802.15.4, faces significant security challenges that threaten the confidentiality, integrity, and availability of its networks. Despite using 128-bit Advanced Encryption Standard (AES) with symmetric keys for node authentication [...] Read more.
ZigBee, a wireless technology standard for the Internet of Things (IoT) devices based on IEEE 802.15.4, faces significant security challenges that threaten the confidentiality, integrity, and availability of its networks. Despite using 128-bit Advanced Encryption Standard (AES) with symmetric keys for node authentication and data confidentiality, ZigBee’s design constraints, such as low cost and low power, have allowed security issues to persist. While ZigBee 3.0 introduces enhanced security features such as install codes and trust centre link key updates, there remains a lack of empirical research evaluating their effectiveness in real-world deployments. This research addresses the gap by conducting a comprehensive, hardware-based analysis of ZigBee 3.0 networks using XBee 3 radio modules and ZigBee-compatible devices. We investigate the following three core security issues: (a) the security of symmetric keys, focusing on vulnerabilities that could allow attackers to obtain these keys; (b) the impact of compromised symmetric keys on network confidentiality; and (c) susceptibility to Denial-of-Service (DoS) attacks due to insufficient protection mechanisms. Our experiments simulate realistic attack scenarios under both Centralised and Distributed Security Models to assess the protocol’s resilience. The findings reveal that while ZigBee 3.0 improves upon earlier versions, certain vulnerabilities remain exploitable. We also propose practical security controls and best practices to mitigate these attacks and enhance network security. This work contributes novel insights into the operational security of ZigBee 3.0, offering guidance for secure IoT deployments and advancing the understanding of protocol-level defences in constrained environments. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

29 pages, 10805 KB  
Article
An Intelligent Hybrid Framework for Threat Pre-Identification and Secure Key Distribution in Zigbee-Enabled IoT Networks Using RBF and Blockchain
by Bhukya Padma, Mahipal Bukya and Ujjwal Ujjwal
Appl. Syst. Innov. 2025, 8(3), 76; https://doi.org/10.3390/asi8030076 - 30 May 2025
Cited by 1 | Viewed by 2541
Abstract
The expansion of Zigbee-enabled IoT networks has generated significant security issues, especially around threat detection and secure key management. Using RBF and blockchain technology, this study shows a smart hybrid framework to find threats early and distribute keys safely on IoT networks enabled [...] Read more.
The expansion of Zigbee-enabled IoT networks has generated significant security issues, especially around threat detection and secure key management. Using RBF and blockchain technology, this study shows a smart hybrid framework to find threats early and distribute keys safely on IoT networks enabled by Zigbee. This methodology incorporates Radial Basis Function (RBF) networks for prompt threat detection and a blockchain-based trust framework for decentralized and tamper-proof key distribution. It guarantees safe network access, comprehensive authentication, and effective key updates, reducing risks associated with IoT-related DoS attacks and Man in the Middle Attacks. The Trust-Based Security Provider (TBSP) enhances security by administering critical credentials across diverse networks. Comprehensive simulations and performance assessments illustrate the effectiveness of the framework in increasing threat detection precision, minimizing key distribution delay, and bolstering overall network security. The findings confirm its efficacy in safeguarding IoT settings from new risks while ensuring scalability and resource efficiency. We proposed an RBF-based threat detection framework for network keys using the ZBDS2023 dataset and the J48 decision tree algorithm. In conclusion, we demonstrate the security and efficiency of our proposed work. Full article
Show Figures

Figure 1

21 pages, 4080 KB  
Article
A Comparative Analysis of Advanced Routing and Cluster Head Selection Algorithm Using Lagrange Interpolation
by Zoren P. Mabunga, Jennifer C. Dela Cruz and Renato R. Maaliw
Telecom 2024, 5(4), 1242-1262; https://doi.org/10.3390/telecom5040062 - 6 Dec 2024
Cited by 1 | Viewed by 1929
Abstract
This paper presents a unified performance metric for evaluating the chronological wild geese optimization (CWGO) algorithm in wireless sensor networks (WSNs). The metric combines key performance factors—energy consumption, delay, distance, and trust—into a single measure using Lagrange interpolation, providing a more comprehensive assessment [...] Read more.
This paper presents a unified performance metric for evaluating the chronological wild geese optimization (CWGO) algorithm in wireless sensor networks (WSNs). The metric combines key performance factors—energy consumption, delay, distance, and trust—into a single measure using Lagrange interpolation, providing a more comprehensive assessment of WSN algorithms. We evaluate CWGO against E-CERP, EECHIGWO, DUCISCA, and DE-SEP across static and dynamic sensor node configurations in various wireless technologies, including LoRa, Wi-Fi, Zigbee, and Bluetooth low energy (BLE). The results show that CWGO consistently outperforms the other algorithms, especially in larger node configurations, demonstrating its scalability and robustness in static and dynamic environments. Moreover, the unified metric reveals significant performance gaps with EECHIGWO, which underperforms all wireless technologies. DUCISCA and DE-SEP show moderate and fluctuating results, underscoring their limitations in larger networks. While E-CERP performs competitively, it generally lags behind CWGO. The unified metric offers a holistic view of algorithm performance, conveying clearer comparisons across multiple factors. This study emphasized the importance of a unified evaluation approach for WSN algorithms and positions CWGO as a superior solution for efficient cluster head selection and routing optimization in diverse WSN scenarios. While CWGO demonstrates superior performance in simulation, future research should validate these findings in real-world deployments, accounting for hardware limitations and in a highly dynamic environment. Further optimization of the unified metrics’ computational efficiency could enhance its real-time applicability in larger, energy-resource-constrained WSNs. Full article
Show Figures

Figure 1

24 pages, 1327 KB  
Article
ZigBeeNet: Decrypted Zigbee IoT Network Traffic Dataset in Smart Home Environment
by Nur Keleşoğlu and Łukasz Sobczak
Appl. Sci. 2024, 14(23), 10844; https://doi.org/10.3390/app142310844 - 23 Nov 2024
Cited by 7 | Viewed by 4541
Abstract
The number of smart homes is increasing steadily. One of the first technologies that comes to mind when talking about smart homes is Zigbee, which stands out for its low cost, low latency, low power consumption, and mesh networking capabilities. One of the [...] Read more.
The number of smart homes is increasing steadily. One of the first technologies that comes to mind when talking about smart homes is Zigbee, which stands out for its low cost, low latency, low power consumption, and mesh networking capabilities. One of the key features of Zigbee is the encryption of payloads within its frames for security purposes. However, being able to decrypt this payload is crucial for fully understanding its operation and for purposes such as testing the network’s security. Therefore, in this paper, we present the decrypted Zigbee IoT Network Traffic dataset, ZigBeeNet. We captured packets using Wireshark in real time from a smart home with 15 Zigbee devices over 20 days and saved them in pcap files. Additionally, we used a key extraction method to obtain the network key, decrypt the payload data, and analyze the characteristic features of network traffic, which we present in this paper. ZigBeeNet will be useful in wider areas than existing datasets with its ability to support network security research, pattern analysis, network performance analysis, and Zigbee traffic generator. We believe that this open-source dataset will contribute significantly to a wide range of industrial and academic research applications. Full article
(This article belongs to the Special Issue AI-Enabled Next-Generation Computing and Its Applications)
Show Figures

Figure 1

14 pages, 9536 KB  
Proceeding Paper
A Simulation Tool for Security in ZigBee-Based IoT Networks
by Marieta Yordanova, Aydan Haka, Veneta Aleksieva and Hristo Valchanov
Eng. Proc. 2024, 70(1), 21; https://doi.org/10.3390/engproc2024070021 - 1 Aug 2024
Cited by 7 | Viewed by 2639
Abstract
The rapid development of IoT technologies leads to their wide use in various spheres of life such as healthcare, agriculture, automotive, etc. IoT devices generate a large amount of data, which, if accessed without authorization, can lead to problems for both organizations and [...] Read more.
The rapid development of IoT technologies leads to their wide use in various spheres of life such as healthcare, agriculture, automotive, etc. IoT devices generate a large amount of data, which, if accessed without authorization, can lead to problems for both organizations and individuals. Therefore, security in IoT networks is a critical aspect. Due to the limited computing resources and memory of IoT devices, cryptographic algorithms are often used for their efficiency. One of the widely used cryptographic algorithms in IoT is the symmetric AES algorithm. It is the main encryption algorithm in ZigBee IoT networks. This paper presents the realization of a simulation environment that enables the investigation of the secure connection process of end nodes in a ZigBee wireless IoT network. The developed environment makes it possible to simulate the process of the secure connection of an end device in a ZigBee network. The simulation makes it possible to trace the process of obtaining an encrypted network key from the trust center based on ZigBee specifications. It is also possible to simulate the process of denying access of an end device to the network. The simulation environment implements network key encryption using the install code or a well-known key defined by the ZigBee Alliance. The encryption functionality in the simulator is realized through the implementation of the AES cryptographic algorithm. Full article
Show Figures

Figure 1

27 pages, 8494 KB  
Article
A Comprehensive Analysis: Evaluating Security Characteristics of Xbee Devices against Zigbee Protocol
by Vlad Gavra, Ovidiu A. Pop and Ionut Dobra
Sensors 2023, 23(21), 8736; https://doi.org/10.3390/s23218736 - 26 Oct 2023
Cited by 8 | Viewed by 3040
Abstract
In recent times, the security of sensor networks, especially in the field of IoT, has become a priority. This article focuses on the security features of the Zigbee protocol in Xbee devices developed by Digi International, specifically in the Xbee 3 (XB3-24) devices. [...] Read more.
In recent times, the security of sensor networks, especially in the field of IoT, has become a priority. This article focuses on the security features of the Zigbee protocol in Xbee devices developed by Digi International, specifically in the Xbee 3 (XB3-24) devices. Using the TI LaunchXL-CC26X2R1 kit, we intercepted and analyzed packets in real-time using the Wireshark application. The study encompasses various stages of network formation, packet transmission and analysis of security key usage, considering scenarios as follows: without security, distributed security mode and centralized security mode. Our findings highlight the differences in security features of Xbee devices compared to the Zigbee protocol, validating and invalidating methods of establishing security keys, vulnerabilities, strengths, and recommended security measures. We also discovered that security features of the Xbee 3 devices are built around a global link key preconfigured therefore constituting a vulnerability, making those devices suitable for man-in-the-middle and reply attacks. This work not only elucidates the complexities of Zigbee security in Xbee devices but also provides direction for future research for authentication methods using asymmetric encryption algorithms such as digital signature based on RSA and ECDSA. Full article
(This article belongs to the Special Issue Communication, Security, and Privacy in IoT)
Show Figures

Figure 1

16 pages, 2050 KB  
Article
Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication
by Alaa Allakany, Abeer Saber, Samih M. Mostafa, Maazen Alsabaan, Mohamed I. Ibrahem and Haitham Elwahsh
Sensors 2023, 23(12), 5703; https://doi.org/10.3390/s23125703 - 19 Jun 2023
Cited by 24 | Viewed by 5483
Abstract
The latest version of ZigBee offers improvements in various aspects, including its low power consumption, flexibility, and cost-effective deployment. However, the challenges persist, as the upgraded protocol continues to suffer from a wide range of security weaknesses. Constrained wireless sensor network devices cannot [...] Read more.
The latest version of ZigBee offers improvements in various aspects, including its low power consumption, flexibility, and cost-effective deployment. However, the challenges persist, as the upgraded protocol continues to suffer from a wide range of security weaknesses. Constrained wireless sensor network devices cannot use standard security protocols such as asymmetric cryptography mechanisms, which are resource-intensive and unsuitable for wireless sensor networks. ZigBee uses the Advanced Encryption Standard (AES), which is the best recommended symmetric key block cipher for securing data of sensitive networks and applications. However, AES is expected to be vulnerable to some attacks in the near future. Moreover, symmetric cryptosystems have key management and authentication issues. To address these concerns in wireless sensor networks, particularly in ZigBee communications, in this paper, we propose a mutual authentication scheme that can dynamically update the secret key value of device-to-trust center (D2TC) and device-to-device (D2D) communications. In addition, the suggested solution improves the cryptographic strength of ZigBee communications by improving the encryption process of a regular AES without the need for asymmetric cryptography. To achieve that, we use a secure one-way hash function operation when D2TC and D2D mutually authenticate each other, along with bitwise exclusive OR operations to enhance cryptography. Once authentication is accomplished, the ZigBee-based participants can mutually agree upon a shared session key and exchange a secure value. This secure value is then integrated with the sensed data from the devices and utilized as input for regular AES encryption. By adopting this technique, the encrypted data gains robust protection against potential cryptanalysis attacks. Finally, a comparative analysis is conducted to illustrate how the proposed scheme effectively maintains efficiency in comparison to eight competitive schemes. This analysis evaluates the scheme’s performance across various factors, including security features, communication, and computational cost. Full article
(This article belongs to the Collection Wireless Sensor Networks towards the Internet of Things)
Show Figures

Figure 1

17 pages, 2452 KB  
Article
Efficient Secure Communication in Zigbee Network Using the DNA Sequence Encryption Technique
by Bhukya Padma and Erukala Suresh Babu
Life 2023, 13(5), 1147; https://doi.org/10.3390/life13051147 - 9 May 2023
Cited by 5 | Viewed by 2654
Abstract
Zigbee IoT devices have limited computational resources, including processing power and memory capacity. Therefore, because of their complicated computational requirements, traditional encryption techniques are inappropriate for Zigbee devices. Because of this, we proposed a novel, “lightweight encryption” method (algorithm) is based on “DNA [...] Read more.
Zigbee IoT devices have limited computational resources, including processing power and memory capacity. Therefore, because of their complicated computational requirements, traditional encryption techniques are inappropriate for Zigbee devices. Because of this, we proposed a novel, “lightweight encryption” method (algorithm) is based on “DNA sequences” for Zigbee devices. In the proposed way, we took advantage of the randomness of “DNA sequences” to produce a full secret key that attackers cannot crack. The DNA key encrypts the data using two operations, “substitution” and “transposition”, which are appropriate for Zigbee computation resources. Our suggested method uses the “signal-to-interference and noise ratio (SINR)”, “congestion level”, and “survival factor” for estimating the “cluster head selection factor” initially. The cluster head selection factor is used to group the network nodes using the “adaptive fuzzy c-means clustering technique”. Data packets are then encrypted using the DNA encryption method. Our proposed technique gave the best results by comparing the experimental results to other encryption algorithms and the metrics for energy consumption, such as “node remaining energy level”, key size, and encryption time. Full article
Show Figures

Figure 1

35 pages, 3872 KB  
Article
Incorporating Artificial Intelligence Technology in Smart Greenhouses: Current State of the Art
by Chrysanthos Maraveas
Appl. Sci. 2023, 13(1), 14; https://doi.org/10.3390/app13010014 - 20 Dec 2022
Cited by 118 | Viewed by 31360
Abstract
This article presents the current state-of-the-art research on applying artificial intelligence (AI) technology in smart greenhouses to optimize crop yields, water, and fertilizer use efficiency, to reduce pest and disease, and to enhance agricultural sustainability. The key technologies of interest were robotic systems [...] Read more.
This article presents the current state-of-the-art research on applying artificial intelligence (AI) technology in smart greenhouses to optimize crop yields, water, and fertilizer use efficiency, to reduce pest and disease, and to enhance agricultural sustainability. The key technologies of interest were robotic systems for pesticide application, irrigation, harvesting, bio-inspired algorithms for the automation of greenhouse processes, energy management, machine path planning and operation of UAVs (unmanned aerial vehicles), resolution of scheduling problems, and image signal processing for pest and disease diagnosis. Additionally, the review investigated the cost benefits of various energy-management and AI-based energy-saving technologies, the integration of photovoltaics and dynamic pricing based on real-time and time-of-use metrics, and the cost benefits of LoRa, Wi-Fi, Bluetooth, ZigBee, mobile, and RFID (radiofrequency identification) technologies. The review established that commercially viable AI technologies for agriculture had increased exponentially. For example, AI-based irrigation and soil fertilizer application enabled farmers to realize higher returns on investment on fertilizer application and gross returns above the fertilizer cost, higher yields, and resource use efficiency. Similarly, AI image detection techniques led to the early diagnosis of powdery mildew. The precise operation of agricultural robots was supported by the integration of light imaging, detection, and ranging (LIDAR) optical and electro-optical cameras in place of the traditional GPS (geographic positioning systems) technologies, which are prone to errors. However, critical challenges remained unresolved, including cost, disparities between research and development (R&D) innovations and technology commercialization, energy use, the tradeoff between accuracy and computational speeds, and technology gaps between the Global North and South. In general, the value of this review is that it surveys the literature on the maturity level of various AI technologies in smart greenhouses and offers a state-of-the-art picture of how far the technologies have successfully been applied in agriculture and what can be done to optimize their usability. Full article
(This article belongs to the Collection Heuristic Algorithms in Engineering and Applied Sciences)
Show Figures

Figure 1

23 pages, 9226 KB  
Article
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
by Noon Hussein and Armstrong Nhlabatsi
IoT 2022, 3(4), 450-472; https://doi.org/10.3390/iot3040024 - 23 Nov 2022
Cited by 28 | Viewed by 9789
Abstract
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart [...] Read more.
The Internet of Things (IoT) has provided substantial enhancements to the communication of sensors, actuators, and their controllers, particularly in the field of home automation. Home automation is experiencing a huge rise in the proliferation of IoT devices such as smart bulbs, smart switches, and control gateways. However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks. In order to address this challenge the adoption of IoT devices in automation has mandated the adoption of secure communication protocols to ensure that compromised key security objectives, such as confidentiality, integrity, and availability are addressed. In light of this, this work evaluates the feasibility of MQTT-based Denial of Service (DoS) attacks, Man-in-the-Middle (MitM), and masquerade attacks on a ZigBee network, an IoT standard used in wireless mesh networks. Performed through MQTT, the attacks extend to compromise neighboring Constrained Application Protocol (CoAP) nodes, a specialized service layer protocol for resource-constrained Internet devices. By demonstrating the attacks on an IKEA TRÅDFRI lighting system, the impact of exploiting ZigBee keys, the basis of ZigBee security, is shown. The reduction of vulnerabilities to prevent attacks is imperative for application developers in this domain. Two Intrusion Detection Systems (IDSs) are proposed to mitigate against the proposed attacks, followed by recommendations for solution providers to improve IoT firmware security. The main motivation and purpose of this work is to demonstrate that conventional attacks are feasible and practical in commercial home automation IoT devices, regardless of the manufacturer. Thus, the contribution to the state-of-the-art is the design of attacks that demonstrate how known vulnerabilities can be exploited in commercial IoT devices for the purpose of motivating manufacturers to produce IoT systems with improved security. Full article
Show Figures

Figure 1

29 pages, 9027 KB  
Article
Hybrid Architecture Based System for the Establishment of Sustainable Environment in a Construction Site with 433 MHz LoRa and 2.4 GHz Zigbee
by Gangishetty Arun Kumar, Ajay Roy, Rajesh Singh, Anita Gehlot, Mamoon Rashid, Shaik Vaseem Akram, Sultan S. Alshamrani, Abdullah Alshehri and Ahmed Saeed AlGhamdi
Sustainability 2022, 14(10), 6280; https://doi.org/10.3390/su14106280 - 21 May 2022
Cited by 20 | Viewed by 4166
Abstract
The rapid development of technology has empowered us to achieve resilient infrastructure to establish a sustainable ecosystem. The construction site is one of the highest risk jobs for accident-related fatalities and injuries globally. From the previous studies, it is concluded that untrained or [...] Read more.
The rapid development of technology has empowered us to achieve resilient infrastructure to establish a sustainable ecosystem. The construction site is one of the highest risk jobs for accident-related fatalities and injuries globally. From the previous studies, it is concluded that untrained or inexperienced workers were responsible for 40% of work-related accidents and the Health and Safety Executive (HSE) report concludes that inadequate working experience, knowledge, and safety awareness were the key causes of fatal accidents in the construction industry. Moreover, it is identified from previous studies that digital technology such as IoT with the assistance of wireless sensors can enhance the safety of construction sites. Based on this advantage, this study has implemented the hybrid architecture with the integration of the 2.4 GHz Zigbee, 433 MHz long-range (LoRa), and Wi-Fi communication protocol to monitor the health status of workers and construction sites and also to identify workers’ equipment wearing status in real-time scenarios. The proposed architecture is realized by implementing customized hardware, based on 2.4 GHz Zigbee, 433 MHz long-range (LoRa), and Wi-Fi. Furthermore, in the analysis of the evaluation metrics of LoRa, it is concluded that the lowest sensitivity is observed for SF 12 at BW 41.7 kHz and the highest is observed for SF 7 at BW 500 kHz; the maximum value data rate is observed at BW 500 kHz at CR 1 for SF 7, and the minimum data rate is observed at BW 41.7 at CR 4 for SF 12. In the future, the customized hardware will be implemented in different construction environments resolving possible challenges that empower to implementation of the proposed architecture in wide extensions. Full article
Show Figures

Figure 1

21 pages, 3056 KB  
Article
Modeling and Fault Tolerance Analysis of ZigBee Protocol in IoT Networks
by Paweł Dymora, Mirosław Mazurek and Krzysztof Smalara
Energies 2021, 14(24), 8264; https://doi.org/10.3390/en14248264 - 8 Dec 2021
Cited by 13 | Viewed by 4316
Abstract
This paper presents the essence of IoT (Internet of Things) works and design challenges, discusses its principles of operation, and presents IoT development concepts. WSN (Wireless Sensor Network) was characterized in detail as an essential component of IoT infrastructure. The various faults that [...] Read more.
This paper presents the essence of IoT (Internet of Things) works and design challenges, discusses its principles of operation, and presents IoT development concepts. WSN (Wireless Sensor Network) was characterized in detail as an essential component of IoT infrastructure. The various faults that can occur at all levels of the IoT architecture, such as sensor nodes, actuators, network links, as well as processing and storage components clearly demonstrate that fault-tolerance (FT) has become a key issue for IoT systems. A properly applied routing algorithm has a direct impact on the power consumption of sensors, which in extreme cases is the reason why nodes shut down due to battery degradation. To study the fault tolerance of IoT infrastructure, a ZigBee network topology was created, and various node failure scenarios were simulated. Furthermore, the results presented showed the impact and importance of choosing the right routing scheme, based on the correlation of throughput to the number of rejected packets, as well as the proportionality of the value of management traffic to the other including the ratio of rejected packets. Full article
Show Figures

Figure 1

16 pages, 1724 KB  
Article
Reliable Bidirectional Data Transfer Approach for the Internet of Secured Medical Things Using ZigBee Wireless Network
by Amjad Rehman, Khalid Haseeb, Suliman Mohamed Fati, Jaime Lloret and Lourdes Peñalver
Appl. Sci. 2021, 11(21), 9947; https://doi.org/10.3390/app11219947 - 25 Oct 2021
Cited by 12 | Viewed by 3334
Abstract
Nowadays, the Internet of Things (IoT) performs robust services for real-time applications in monitoring communication systems and generating meaningful information. The ZigBee devices offer low latency and manageable costs for wireless communication and support the process of physical data collection. Some biosensing systems [...] Read more.
Nowadays, the Internet of Things (IoT) performs robust services for real-time applications in monitoring communication systems and generating meaningful information. The ZigBee devices offer low latency and manageable costs for wireless communication and support the process of physical data collection. Some biosensing systems comprise IoT-based ZigBee devices to monitor patient healthcare attributes and alert healthcare professionals for needed action. However, most of them still face unstable and frequent data interruption issues due to transmission service intrusions. Moreover, the medical data is publicly available using cloud services, and communicated through the smart devices to specialists for evaluation and disease diagnosis. Therefore, the applicable security analysis is another key factor for any medical system. This work proposed an approach for reliable network supervision with the internet of secured medical things using ZigBee networks for a smart healthcare system (RNM-SC). It aims to improve data systems with manageable congestion through load-balanced devices. Moreover, it also increases security performance in the presence of anomalies and offers data routing using the bidirectional heuristics technique. In addition, it deals with more realistic algorithm to associate only authorized devices and avoid the chances of compromising data. In the end, the communication between cloud and network applications is also protected from hostile actions, and only certified end-users can access the data. The proposed approach was tested and analyzed in Network Simulator (NS-3), and, compared to existing solutions, demonstrated significant and reliable performance improvements in terms of network throughput by 12%, energy consumption by 17%, packet drop ratio by 37%, end-to-end delay by 18%, routing complexity by 37%, and tampered packets by 37%. Full article
(This article belongs to the Special Issue IoT-Enhancing the Industrial World)
Show Figures

Figure 1

Back to TopTop